When someone uses another persons identity. The assumed identity could be real or made up.
Identity Theft
The process of getting personal identifying information of a person. This could happed by having credit card details skimmed when you make a purchase, losing your wallet or other personal effects, or having them stolen. You could provide your details by phone or email to what you think are legitimate businesses or have your personal information stolen from an unsecured site on the internet. Perhaps most unexpected of all, you could have your identity stolen and used by someone you know and trust—a friend, relative or work colleague.
How your identity may be stolen
There are lots of ways that your identity can be stolen and only some of these involve the use of computers and the internet
wallet or purse stolen with personal documents in it
home is burgled
letterbox raided
a thief could fill in a ‘change of address’ form and your mail goes to a new address.
rubbish is raided, yours or a business you have dealt with
victim of a scam and be conned into providing personal information over the telephone or by email.
personal computer may be hacked into
ATM or EFTPOS transactions may be monitored by hidden devices or seen by the person next in the queue
personal information may be stolen and used or sold by employees of legitimate businesses
card skimming
Solutions that involve the use of computers and the internet
Good virus prevention procedures
Use good passwords and change them frequently
Avoid giving personal information out over the phone, by mail or on the internet.
For more complete information about this, download the Identity Theft Kit
Identity Fraud
When someone uses another persons identity. The assumed identity could be real or made up.Identity Theft
The process of getting personal identifying information of a person. This could happed by having credit card details skimmed when you make a purchase, losing your wallet or other personal effects, or having them stolen. You could provide your details by phone or email to what you think are legitimate businesses or have your personal information stolen from an unsecured site on the internet. Perhaps most unexpected of all, you could have your identity stolen and used by someone you know and trust—a friend, relative or work colleague.How your identity may be stolen
There are lots of ways that your identity can be stolen and only some of these involve the use of computers and the internetSolutions that involve the use of computers and the internet
For more complete information about this, download the Identity Theft Kit